Works matching IS 27729184 AND DT 2024 AND VI 2
Results: 22
Mutual information based logistic regression for phishing URL detection.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2024.100044
- By:
- Publication type:
- Article
Security analysis of cyber physical system using digital forensic incident response.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2023.100034
- By:
- Publication type:
- Article
Secure and sustainable food processing supply chain framework based on Hyperledger Fabric technology.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2024.100045
- By:
- Publication type:
- Article
SDN enabled role based shared secret scheme for virtual machine security in cloud environment.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2024.100043
- By:
- Publication type:
- Article
Quantum vs post-quantum security for future networks: Survey.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2024.100039
- By:
- Publication type:
- Article
Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2024.100046
- By:
- Publication type:
- Article
Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2024.100037
- By:
- Publication type:
- Article
Increasing embedding capacity of stego images by exploiting edge pixels in prediction error space.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2023.100028
- By:
- Publication type:
- Article
Enhancing intrusion detection systems through dimensionality reduction: A comparative study of machine learning techniques for cyber security.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2023.100033
- By:
- Publication type:
- Article
Energy-efficient classification strategy for detecting interference and malicious sensor nodes in wireless body area Networks.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2024.100048
- By:
- Publication type:
- Article
Efficient time-oriented latency-based secure data encryption for cloud storage.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2023.100027
- By:
- Publication type:
- Article
E-Brightpass: A Secure way to access social networks on smartphones.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2023.100021
- By:
- Publication type:
- Article
Cyber security: State of the art, challenges and future directions.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2023.100031
- By:
- Publication type:
- Article
Colour image encryption algorithm using Rubik's cube scrambling with bitmap shuffling and frame rotation.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2023.100030
- By:
- Publication type:
- Article
Automatic generation of security protocols attacks specifications and implementations.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2024.100038
- By:
- Publication type:
- Article
A three-factor mutual authentication scheme for telecare medical information system based on ECC.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2024.100035
- By:
- Publication type:
- Article
A survey on exploring the challenges and applications of wireless body area networks (WBANs).
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2024.100047
- By:
- Publication type:
- Article
A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2024.100040
- By:
- Publication type:
- Article
Any Bluetooth device can be hacked. Know how?
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2024.100041
- By:
- Publication type:
- Article
A novel dual optimized IDS to detect DDoS attack in SDN using hyper tuned RFE and deep grid network.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2024.100042
- By:
- Publication type:
- Article
An application for predicting phishing attacks: A case of implementing a support vector machine learning model.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2024.100036
- By:
- Publication type:
- Article
A blockchain-based anonymous reporting system with no central authority: Architecture and protocol.
- Published in:
- Cyber Security & Applications, 2024, v. 2, p. 1, doi. 10.1016/j.csa.2023.100032
- By:
- Publication type:
- Article